• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

9 Professional Ethics courses delivered Live Online

Certified Information Security Systems Professional (CISSP)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites * CompTIA Network+ Certification 1 - SECURITY AND RISK MANAGEMENT * Security Governance Principles * Compliance * Professional Ethics * Security Documentation * Risk Management * Threat Modeling * Business Continuity Plan Fundamentals * Acquisition Strategy and Practice * Personnel Security Policies * Security Awareness and Training 2 - ASSET SECURITY * Asset Classification * Privacy Protection * Asset Retention * Data Security Controls * Secure Data Handling 3 - SECURITY ENGINEERING * Security in the Engineering Lifecycle * System Component Security * Security Models * Controls and Countermeasures in Enterprise Security * Information System Security Capabilities * Design and Architecture Vulnerability Mitigation * Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems * Cryptography Concepts * Cryptography Techniques * Site and Facility Design for Physical Security * Physical Security Implementation in Sites and Facilities 4 - INFORMATION SECURITY MANAGEMENT GOALS * Organizational Security * The Application of Security Concepts 5 - INFORMATION SECURITY CLASSIFICATION AND PROGRAM DEVELOPMENT * Information Classification * Security Program Development 6 - RISK MANAGEMENT AND ETHICS * Risk Management * Ethics 7 - SOFTWARE DEVELOPMENT SECURITY * Software Configuration Management * Software Controls * Database System Security 8 - CRYPTOGRAPHY * Ciphers and Cryptography * Symmetric-Key Cryptography * Asymmetric-Key Cryptography * Hashing and Message Digests * Email, Internet, and Wireless Security * Cryptographic Weaknesses 9 - PHYSICAL SECURITY * Physical Access Control * Physical Access Monitoring * Physical Security Methods * Facilities Security

Certified Information Security Systems Professional (CISSP)
Delivered Online6 days, Jun 17th, 13:00 + 8 more
£3395

Reiki Level 2 Practitioner Online Course

By Margaret Cook Reiki Teaching and Coaching

I am a Reiki Teacher in Manchester and one of the few traditionally trained Reiki Masters in the UK who have been trained by international best-selling Reiki author Penelope Quest. My teaching methods use traditional Reiki techniques perfected over many years and you can be assured of my support during and after your course. I teach all three levels of Reiki courses, level 1 reiki. level 2 reiki and reiki master level 3

Reiki Level 2 Practitioner Online Course
Delivered Online5 hours, Jun 29th, 10:00 + 9 more
£297

CRISC Certified in Risk and Information Systems Control

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - A. ORGANIZATIONAL GOVERNANCE * Organizational Strategy, Goals, and Objectives * Organizational Structure, Roles, and Responsibilities * Organizational Culture * Policies and Standards * Business Processes * Organizational Assets GOVERNANCE - B. RISK GOVERNANCE * Enterprise Risk Management and Risk Management Framework * Three Lines of Defense * Risk Profile * Risk Appetite and Risk Tolerance * Legal, Regulatory, and Contractual Requirements * Professional Ethics of Risk Management IT RISK ASSESSMENT - A. IT RISK IDENTIFICATION * Risk Events (e.g., contributing conditions, loss result) * Threat Modelling and Threat Landscape * Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) * Risk Scenario Development IT RISK ASSESSMENT - B. IT RISK ANALYSIS AND EVALUATION * Risk Assessment Concepts, Standards, and Frameworks * Risk Register * Risk Analysis Methodologies * Business Impact Analysis * Inherent and Residual Risk RISK RESPONSE AND REPORTING - A. RISK RESPONSE * Risk Treatment / Risk Response Options * Risk and Control Ownership * Third-Party Risk Management * Issue, Finding, and Exception Management * Management of Emerging Risk RISK RESPONSE AND REPORTING - B. CONTROL DESIGN AND IMPLEMENTATION * Control Types, Standards, and Frameworks * Control Design, Selection, and Analysis * Control Implementation * Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - C. RISK MONITORING AND REPORTING * Risk Treatment Plans * Data Collection, Aggregation, Analysis, and Validation * Risk and Control Monitoring Techniques * Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) * Key Performance Indicators * Key Risk Indicators (KRIs) * Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - A. INFORMATION TECHNOLOGY PRINCIPLES * Enterprise Architecture * IT Operations Management (e.g., change management, IT assets, problems, incidents) * Project Management * Disaster Recovery Management (DRM) * Data Lifecycle Management * System Development Life Cycle (SDLC) * Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - B. INFORMATION SECURITY PRINCIPLES * Information Security Concepts, Frameworks, and Standards * Information Security Awareness Training * Business Continuity Management * Data Privacy and Data Protection Principles

CRISC Certified in Risk and Information Systems Control
Delivered Online4 days, Sept 9th, 13:00 + 1 more
£2037

Data Ethics for Business Professionals

By Mpi Learning - Professional Learning And Development Provider

Data Ethics for Business Professionals is designed for individuals who are seeking to demonstrate an understanding of the ethical uses of data in business settings.

Data Ethics for Business Professionals
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£45

Hypnotherapy Practitioner Training Course

5.0(4)

By h2 Hypnotherapy Training

Professional GHSC accredited hypnotherapy practitioner training course studied either live online from anywhere or in-person at clinic in Perthshire, Scotland

Hypnotherapy Practitioner Training Course
Delivered Online16 weeks, Aug 31st, 13:00
£1850

Business Ethics

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for This course is intended for individuals who desire to influence, develop, and/or implement a business ethics program in an organization. Overview Upon successful completion of this course, students will be able to foster a successful company culture and increase profitability by implementing a program of good business ethics. In this course, students will grow in their understanding of business ethics, their impact on all business levels and how all who interact with the company influence the development of a company business ethic. GETTING STARTED * Icebreaker Housekeeping Items The Parking Lot Workshop Objectives WHAT IS ETHICS? * What is Business Ethics 10 Benefits of Managing Ethics Case Study IMPLEMENTING ETHICS IN THE WORKPLACE * Benefits Guidelines for Managing Ethics in the Workplace Roles and Responsibilities EMPLOYER / EMPLOYEE RIGHTS * Privacy Policies Harassment Issues Technology BUSINESS AND SOCIAL RESPONSIBILITIES * Identifying Types of Responsibilities Case Study Handling Conflicting Social and Business Responsibilities Case Study ETHICAL DECISIONS * The Basics Balancing Personal and Organizational Ethics Common Dilemmas Making Ethical Decisions Overcoming Obstacles WHISTLE BLOWING * Criteria and Risk The Process When You Should 'Blow the Whistle MANAGERIAL ETHICS * Ethical Management Identifying the Characteristics Ensuring Ethical Behavior UNETHICAL BEHAVIOR * Recognize and Identify Preventing Addressing Interventions ETHICS IN BUSINESS (I) * Organization Basics Addressing the Needs Ethical Principles ETHICS IN BUSINESS (II) * Ethical Safeguards Developing a Code of Ethics Performing an Internal Ethics Audit Upholding the Ethics Program WRAPPING UP * Words from the Wise Review of Parking Lot Lessons Learned Completion of Action Plans and Evaluations ADDITIONAL COURSE DETAILS: Nexus Humans Business Ethics training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Business Ethics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Business Ethics
Delivered on-request, onlineDelivered Online
Price on Enquiry

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for technology leaders, solution developers, project managers, organizational decision makers, and other individuals seeking to demonstrate a vendor-neutral, cross-industry understanding of ethics in emerging data-driven technologies, such as AI, robotics, IoT, and data science. This course is also designed for professionals who want to pursue the CertNexus Certification Exam CET-110: Certified Ethical Emerging Technologies. Overview In this course, you will incorporate ethics into data-driven technologies such as AI, IoT, and data science. You will: Describe general concepts, theories, and challenges related to ethics and emerging technologies. Identify ethical risks. Practice ethical reasoning. Identify and mitigate safety and security risks. Identify and mitigate privacy risks. Identify and mitigate fairness and bias risks. Identify and mitigate transparency and explainability risks. Identify and mitigate accountability risks. Build an ethical organization. Develop ethical systems in technology-focused organizations. Mutually reinforcing innovations in computing and engineering are catapulting advances in technological production. From blockchain and artificial intelligence (AI) to gene editing and the Internet of Things (IoT), these advances come with tremendous opportunities for improvement in productivity, efficiency, and human well-being. But as scandals increasingly demonstrate, these advances also introduce new and serious risks of conflict and harm.Technology professionals now face growing demands to identify and mitigate ethical risks to human rights and the environment, as well as to navigate ethical tradeoffs between qualities such as privacy and accuracy, fairness and utility, and safety and accountability. This course provides the tools to identify and manage common ethical risks in the development of emerging data-driven technologies. It distills ethical theory, public regulations, and industry best practices into concrete skills and guidelines needed for the responsible development of digital products and services. By following the course's practical, problems-based approach, learners will become adept at applying theories, principles, frameworks, and techniques in their own roles and organizations. INTRODUCTION TO ETHICS OF EMERGING TECHNOLOGIES * Topic A: What?s at Stake * Topic B: Ethics and Why It Matters * Topic C: Ethical Decision-Making in Practice * Topic D: Causes of Ethical Failures * IDENTIFYING ETHICAL RISKS * Topic A: Ethical Reasons * Topic B: Stumbling Blocks for Ethical Reasoning * Topic C: Identify Ethical Risks in Product Development * Topic D: Tools for Identifying Ethical Risks * Topic E: Use Regulations, Standards, and Human Rights to Identify Ethical Risks * ETHICAL REASONING IN PRACTICE * Topic A: Ethical Theories * Topic B: Use Ethical Decision-Making Frameworks * Topic C: Select Options for Action * Topic D: Avoid Problems in Ethical Decision-Making * IDENTIFYING AND MITIGATING SECURITY RISKS * Topic A: What Is Security? * Topic B: Identify Security Risks * Topic C: Security Tradeoffs * Topic D: Mitigate Security Risks * IDENTIFYING AND MITIGATING PRIVACY RISKS * Topic A: What Is Privacy? * Topic B: Identify Privacy Risks * Topic C: Privacy Tradeoffs * Topic D: Mitigate Privacy Risks * IDENTIFYING AND MITIGATING FAIRNESS AND BIAS RISKS * Topic A: What Are Fairness and Bias? * Topic B: Identify Bias Risks * Topic C: Fairness Tradeoffs * Topic D: Mitigate Bias Risks * IDENTIFYING AND MITIGATING TRANSPARENCY AND EXPLAINABILITY RISKS * Topic A: What Are Transparency and Explainability? * Topic B: Identify Transparency and Explainability Risks * Topic C: Transparency and Explainability Tradeoffs * Topic D: Mitigate Transparency and Explainability Risks * IDENTIFYING AND MITIGATING ACCOUNTABILITY RISKS * Topic A: What Is Accountability? * Topic B: Identify Accountability Risks * Topic C: Accountability Tradeoffs * Topic D: Mitigate Accountability Risks * BUILDING AN ETHICAL ORGANIZATION * Topic A: What Are Ethical Organizations? * Topic B: Organizational Purpose * Topic C: Ethics Awareness * Topic D: Develop Professional Ethics within Organizations * DEVELOPING ETHICAL SYSTEMS IN TECHNOLOGY-FOCUSED ORGANIZATIONS * Topic A: Policy and Compliance * Topic B: Metrics and Monitoring * Topic C: Communication and Stakeholder Engagement * Topic D: Ethical Leadership *

CertNexus Certified Ethical Emerging Technologist (CEET) v1.0
Delivered on-request, onlineDelivered Online
Price on Enquiry

C)PEH - Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for IS Security Owners Security Officers Ethical Hackers Information Owners Penetration Testers System Owners and Managers Cyber Security Engineers Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the C)PEH exam. To protect an information system you need to be able to see that system through the eyes of the attacker.ÿThe Certified Professional Ethical Hackerÿcertification course is the foundational training to Mile2?s line of penetration testing courses because it teaches you to think like a hacker.ÿ Therefore, you can set up dynamic defenses to prevent intrusion. First, you will learn the value of vulnerability assessments.ÿ Then, you will discover how to use those assessments to make powerful changes in an information system?s security. Additionally, you will learn how malware and destructive viruses function and how to implement counter response and preventative measures when it comes to a network hack. COURSE INTRODUCTION * Introduction to Ethical Hacking * Linux Fundamentals * Protocols * Cryptography * Password Cracking * Malware * Security Devices * Information Gathering ? Passive Reconnaissance * Social Engineering * Active Reconnaissance * Vulnerability Assessment * Network Attacks * Hacking Servers * Hacking Web Technologies * Hacking Wireless Technologies * Maintaining Access and Covering Tracks

C)PEH - Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. SECURITY FUNDAMENTALS * Overview * The Growth of * Environments and Security * Our Motivation? * The Goal: Protecting Information! * CIA Triad in Detail * Approach Security Holistically * Security Definitions * Definitions Relationships * Method: Ping * The TCP/IP Stack * Which Services Use Which Ports? * TCP 3-Way Handshake * TCP Flags * Malware * Types of Malware * Types of Malware Cont... * Types of Viruses * More Malware: Spyware * Trojan Horses * Back Doors * DoS * DDoS * Packet Sniffers * Passive Sniffing * Active Sniffing * Firewalls, IDS and IPS * Firewall ? First * Line of Defense * IDS ? Second Line of Defense * IPS ? Last Line of Defense? * Firewalls * Firewall Types: * (1) Packet Filtering * Firewall Types: * (2) Proxy Firewalls * Firewall Types ? * Circuit-Level Proxy Firewall * Type of Circuit- * Level Proxy ? SOCKS * Firewall Types ? * Application-Layer Proxy * Firewall Types: (3) Stateful * Firewall Types: * (4) Dynamic Packet-Filtering * Firewall Types: * (5) Kernel Proxies * Firewall Placement * Firewall Architecture * Types ? Screened Host * Multi- or Dual-Homed * Screened Subnet * Wi-Fi Network Types * Wi-Fi Network Types * Widely Deployed Standards * Standards Comparison * 802.11n - MIMO * Overview of Database Server * Review ACCESS CONTROLS * Overview * Role of Access Control * Definitions * More Definitions * Categories of Access Controls * Physical Controls * Logical Controls * ?Soft? Controls * Security Roles * Steps to Granting Access * Access Criteria * Physical Access * Control Mechanisms * Biometric System Types * Synchronous Token * Asynchronous Token Device * Memory Cards * Smart Card * Cryptographic Keys * Logical Access Controls * OS Access Controls * Linux Access Controls * Accounts and Groups * Password & * Shadow File Formats * Accounts and Groups * Linux and UNIX Permissions * Set UID Programs * Trust Relationships * Review PROTOCOLS * Protocols Overview * OSI ? Application Layer * OSI ? Presentation Layer * OSI ? Session Layer * Transport Layer * OSI ? Network Layer * OSI ? Data Link * OSI ? Physical Layer * Protocols at * Each OSI Model Layer * TCP/IP Suite * Port and Protocol Relationship * Conceptual Use of Ports * UDP versus TCP * Protocols ? ARP * Protocols ? ICMP * Network Service ? DNS * SSH Security Protocol * SSH * Protocols ? SNMP * Protocols ? SMTP * Packet Sniffers * Example Packet Sniffers * Review CRYPTOGRAPHY * Overview * Introduction * Encryption * Cryptographic Definitions * Encryption Algorithm * Implementation * Symmetric Encryption * Symmetric Downfalls * Symmetric Algorithms * Crack Times * Asymmetric Encryption * Public Key * Cryptography Advantages * Asymmetric * Algorithm Disadvantages * Asymmetric * Algorithm Examples * Key Exchange * Symmetric versus Asymmetric * Using the * Algorithm Types Together * Instructor Demonstration * Hashing * Common Hash Algorithms * Birthday Attack * Example of a Birthday Attack * Generic Hash Demo * Instructor Demonstration * Security Issues in Hashing * Hash Collisions * MD5 Collision Creates * Rogue Certificate Authority * Hybrid Encryption * Digital Signatures * SSL/TLS * SSL Connection Setup * SSL Hybrid Encryption * SSH * IPSec - Network Layer Protection * IPSec * IPSec * Public Key Infrastructure * Quantum Cryptography * Attack Vectors * Network Attacks * More Attacks (Cryptanalysis) * Review WHY VULNERABILITY ASSESSMENTS? * Overview * What is a * Vulnerability Assessment? * Vulnerability Assessment * Benefits of a * Vulnerability Assessment * What are Vulnerabilities? * Security Vulnerability Life Cycle * Compliance and Project Scoping * The Project * Overview Statement * Project Overview Statement * Assessing Current * Network Concerns * Vulnerabilities in Networks * More Concerns * Network Vulnerability * Assessment Methodology * Network Vulnerability * Assessment Methodology * Phase I: Data Collection * Phase II: Interviews, Information Reviews, and Hands-On Investigation * Phase III: Analysis * Analysis cont. * Risk Management * Why Is Risk * Management Difficult? * Risk Analysis Objectives * Putting Together * the Team and Components * What Is the Value of an Asset? * Examples of Some Vulnerabilities that Are Not Always Obvious * Categorizing Risks * Some Examples * of Types of Losses * Different Approaches * to Analysis * Who Uses What? * Qualitative Analysis Steps * Quantitative Analysis * ALE Values Uses * ALE Example * ARO Values and Their Meaning * ALE Calculation * Can a Purely Quantitative Analysis Be Accomplished? * Comparing Cost and Benefit * Countermeasure Criteria * Calculating Cost/Benefit * Cost of a Countermeasure * Can You Get Rid of All Risk? * Management?s Response to Identified Risks * Liability of Actions * Policy Review * (Top-Down) Methodology * Definitions * Policy Types * Policies with Different Goals * Industry Best * Practice Standards * Components that Support the Security Policy * Policy Contents * When Critiquing a Policy * Technical (Bottom-Up) * Methodology * Review VULNERABILITY TOOLS OF THE TRADE * Vulnerability Scanners * Nessus * SAINT ? Sample Report * Tool: Retina * Qualys Guard * http://www.qualys.com/products/overview/ * Tool: LANguard * Microsoft Baseline Analyzer * MBSA Scan Report * Dealing with Assessment Results * Patch Management Options * Review OUTPUT ANALYSIS AND REPORTS * Overview * Staying Abreast: Security Alerts * Vulnerability Research Sites * Nessus * SAINT * SAINT Reports * GFI Languard * GFI Reports * MBSA * MBSA Reports * Review RECONNAISSANCE, ENUMERATION & SCANNING * Reconnaissance Overview * Step One in the * Hacking ?Life-Cycle? * What Information is * Gathered by the Hacker? * Passive vs. Active Reconnaissance * Footprinting Defined * Social Access * Social Engineering Techniques * Social Networking Sites * People Search Engines * Internet Archive: * The WayBack Machine * Footprinting Tools Overview * Maltego GUI * Johnny.Ihackstuff.com * Google (cont.) * Domain Name Registration * WHOIS Output * DNS Databases * Using Nslookup * Traceroute Operation * Web Server Info Tool: Netcraft * Introduction to Port Scanning * Which Services * use Which Ports? * Port Scan Tips * Port Scans Shou

Certified Professional Ethical Hacker
Delivered on-request, onlineDelivered Online
Price on Enquiry

Educators matching "Professional Ethics"

Show all 537
Duco Digital Training

duco digital training

5.0(12)

Redcar

Duco Digital Training [https://ducodigitaltraining.com/courses] is a trusted provider of BCS online accredited courses, boot camps and training in an exciting range of business and technology subjects, Artificial Intelligence (AI) & Machine Learning, [https://ducodigitaltraining.com/artificial-intelligence-courses] Business Analysis [https://ducodigitaltraining.com/business-analysis-courses], Data Protection [https://ducodigitaltraining.com/data-protection-courses], Data Analysis [https://ducodigitaltraining.com/data-analysis-courses], Digital Product Management [https://ducodigitaltraining.com/digital-product-management-course], IT Ethics [https://ducodigitaltraining.com/business-and-it-ethics-courses], Sales and Marketing [https://ducodigitaltraining.com/sales-and-marketing-courses], and Management [https://ducodigitaltraining.com/management-courses]. These range from short courses (awards), focused certifications at essential, foundation and practitioner levels, diplomas and bundles; designed to fit with career goals, your available time to learn and budget. As well as strengthening skills and knowledge in a current role, these industry-recognised qualifications are recognised in over 200 countries, and can also open up a range of exciting new opportunities with a free one-year membership to BCS which offers professional networking, CPD and career support when learners pass their exam with Duco Digital. We are committed to making learning as easy as possible. Our courses are designed so you can learn at home or work, without excessive reading or time-consuming assignments. Upgrade your skills and become indispensable to your company - enrol on a course today and begin your path to success!

Responsible Research In Practice

responsible research in practice

Horsham

Responsible Research in Practice was founded by Dr Nikki Osborne in 2015 to provide training & consultancy services to individuals & organisations working withing the Life Science research sector. The company is a UK Reproducibility Network external stakeholder affiliate member & a UK registered learning provider (UKRLP No. 10092337 [https://www.ukrlp.co.uk/ukrlp/ukrlp_provider.page_pls_searchProviders]). How can we help you? * FREE Responsible Research Webinars [https://www.responsibleresearchinpractice.co.uk/free-responsible-research-webinars/]. We run a monthly LIVE responsible research webinar series that is FREE to attend & fully open access on-demand. Topics vary but all relate to the practical 'how to' details of implementing best practice. All our professional & inspiring speakers are passionate about the topics they discuss & all attendees receive a certificate of attendance that can be used for CPD purposes.  * On-Demand Training [https://www.responsibleresearchinpractice.co.uk/on-demand-training/]. Our bitesize on-demand training sessions require just 1-2 hours of your time & are accessible 24 hours a day. Whether you are involved in the planning, design, conduct & dissemination of lab-based research, or training, mentoring, supervising & overseeing others - we have an on-demand training session for you. Our professional content is designed empower you to improve the rigour & reproducibility of your work. * Live training [https://www.responsibleresearchinpractice.co.uk/training-services/]. We provide training online and in-person (for client organisations) on a range of topics to support personal development. All our sessions focus on empowering individuals to be their best self by sharing experience of what works, developing critical thinking skills & facilitating self-reflection. To find out more visit our Mindset Awareness [https://www.responsibleresearchinpractice.co.uk/mindset-training/], PREPARE For Better Science [https://www.responsibleresearchinpractice.co.uk/prepare-for-better-science-training-course/], Publication School [https://www.responsibleresearchinpractice.co.uk/lab-animal-publication-school/], Responsible Animal Research [https://www.responsibleresearchinpractice.co.uk/responsible-animal-research-training/] & Statistical Analysis Training [https://www.responsibleresearchinpractice.co.uk/statistical-analysis-training/] pages. * Consultancy services. [https://www.responsibleresearchinpractice.co.uk/consultancy-services/] Training alone is not the solution to everything, so we offer a range of consultancy services including: coaching, independent advice, peer review, professional speaker & policy review/writing. Contact us anytime for a FREE 'no commitment' discussion & if we can help you we will, or we will recommend someone who can. Why work with us?  * We care. All our tutors are passionate about the topics they teach & have knowledge plus real life experience to share.  * We recognise that conducting responsible research is challenging. Our goal is to make doing the right thing simpler & easier to achieve.  * We empower individuals. Our training sessions are designed to inspire & support personal development so that participants feel more confident in their ability to do the right thing.